My Authors
Read all threads
Internet controls are increasing and tightening globally. In response, we’ve updated our SSD guide for understanding online censorship! Throughout the week, we'll be showing some explainers from our new guide, tagged with #CensorshipExplained. ssd.eff.org/en/module/unde…
#CensorshipExplained In this regular connection, your computer connects to eff.org. The request for that website is passed along through various devices, such as your home network router and your ISP, before reaching EFF. The website loads! However...
#CensorshipExplained In this diagram, the request for eff.org’s IP address is modified by the Internet Service Provider. The ISP interferes with the DNS resolver, and the IP address response is changed to give an incorrect answer or no answer.
#CensorshipExplained Here, a computer accesses eff.org/deeplinks over HTTPS. The local network administrator can see you’re visiting eff.org, but not which page, or its content. The admin can decide to block access to some domains and not others.
#CensorshipExplained Here, a computer tries to connect to eff.org. The Internet Service Provider is blocking connections to large swaths of IP addresses belonging to different countries. It's often possible to tell what country an IP address is used in.
#CensorshipExplained In this diagram, the computer uses a VPN to connect to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the website data is encrypted. In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.
In this diagram, the computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but not where from.
Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with EFF

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!